This book is aimed primarily at network, Web, systems, LAN, and WAN administrators. But it is also targeted at the new breed of professionals, the so-called Internet Managers, as well as to anyone in need of a complete reference book on firewalls. As you read this book, you will notice that what separates it from the others is that this book is comprehensive and gives the technical information necessary to understand, choose, install, maintain, and foresee future needs involving firewalls and security at a very informal level. It has a conversational style with practical information, tips, and cautions to help the Internet, network, and security administrator to cope, and "survive" their tasks and responsibilities.
作者簡介
暫缺《防火墻技術(shù)指南(英文版)》作者簡介
圖書目錄
Preface. Acknowledgments Part I Introducing TCP/IP and the Need for Security: Firewalls Chapter 1 Internetworking Protocols and Standards: An Overview Internet Protocol (IP) User Oatagram Protocol (UDP) Transmission Control Protocol (TCP) Extending IP Addresses Through CIDR Routing Information Protocol (RIP) MBONE-The Multicast Backbone Internet Control Message Protocol (ICMP) Internet Group Management Protocol (IGMP) Open Shortest-Path First (OSPF) Border Gateway Protocol Version 4 (BGP-4) Address Resolution Protocol Simple Network Management Protocol (SNMP) Watch Your ISP Connection The Internet Protocol Next Generation or IPv6 Network Time Protocol (NTP) Dynamic Host Configuration Protocol (DHCP) Windows Sockets Domain Name System(DNS) Firewalls Concepts Chapter 2 Basic Connectivity What Happened to What Is the Baudot Code? UNIX to UNIX CoPy (UUCP) SLIP and PPP Rlogin Virtual Terminal Protocol (Telnet) Columbia University's Kermit: A Secure and Reliable Telnet Server Telnet Services Security Considerations A Systems Manager Approach to Network Security Telnet Session Security Checklist Trivial File Transfer Protocol (TFTP) TFTP Security Considerations File Transfer Protocol (FTP) Some of the Challenges of Using Firewalls Increasing Security on IP Networks Chapter 3 Cryptography: Is It Enough? Introduction Symmetric Key Encryption (Private Keys) Data Encryption Standard (DES) International Data Encryption Algorithm (IDEA) CAST Skipjack RC2/RC4 Asymmetric Key Encryption/Public Key Encryption RSA Digital Signature Standard (DSS) Message Digest Algorithms MD2, MD4, and MD5 Secure Hash Standard/Secure Hash Algorithm (SHS/SHA) Certificates Certificate Servers Key Management Kerberos Key-Exchange Algorithms (KEA) …… Chapter 4 Firewalling Challenges:The Basic Web Chapter 5 Firewalling Challenges:The Advanced Web Chapter 6 The API's Security Holes and its Firewall Part 2 Firewall Implementations and Limitations Chapter 7 What is an Internet/Intranet Firewall After All? Chapter 8 How Vulnerable Are Internet Services? Chapter 9 Setting Up a Firewall Security Policy Chapter 10 Putting It Together:Firewall Design and Implementation Chapter 11 proxy Servers Chapter 12 Firewall Maintenance Chapter 13 Firewall Toolkits and Case Studies Part 3 Firewall Resource Guide Chapter 14 Types of Firewalls and Products on the Market Appendix A List of Firewall Resellers and Related Tools Glossary Bibliography Index